Computer technician blog

Categories:

General - General posts, notices and other information.
Viruses - News and articles related to viruses, will be posted in this section.
Windows - How-To guides for Windows users.
Mac - How-To guides for Mac users.

You can subscribe to RSS feed RSS Feed

How To Prevent Windows from Automatically Downloading and Installing Updates

How To Prevent Windows 10 & 7 From Automatically Downloading and Installing Updates?

In earlier Windows versions (before Windows 10), the automatic update install feature could be disabled - you could still let Windows check for updates, but decide if and when the download and install took place. Alternatively, it was possible to completely disable checks for updates. Installing updates takes time (depending on the size of the updates) and so you may wish to skip or delay this process. Windows 10 automatically downloads and installs updates, regardless. On the other hand, automatic updates are typically a good thing, as they allow improvements to your current system. This is especially important in the security updates area. If, however, you prefer to disable them, this article explains how.

 
How to Print to PDF?

How to print to PDF in Windows 10 and Windows 7?

PDF is a portable file standard and a more compatible format than other types of documents. Today, most computer or mobile device operating systems can open PDF documents. Usually, you do not require additional software to open and view a PDF file. When it comes to printing to PDF, Windows is not the most friendly operating system to use (if you are using an older operating system, this feature is probably not available). Generally, however, printing to a PDF is quite simple - you can install a free 'PDF printer' or use various other programs. And, if you are using Windows 10, then it is very simple. This article will show you some easy ways to print to PDF in Windows.

 
How to Restore Closed Tabs in Chrome, Firefox, Explorer, Opera and Edge browsers?

How to restore closed tabs in Internet browsers?

Sometimes you might accidentally close a tab, a situation that frequently happens to us all. If you have just one or two remaining opened tabs, then you will probably remember which page you were browsing and can easily get back to it. But what if what if you were browsing with many opened tabs (maybe more than ten) and you do not remember which one has been closed? Do not worry - this can easily be resolved. In this article we will thoroughly explain how to restore your accidentally closed tabs, how to find and reopen them from your previous browsing history in five of the most popular browsers. This guide is written using the following Internet browser versions: Google Chrome 62, Mozilla Firefox 57, Opera 49, Internet Explorer 11, and Microsoft Edge 40.

 
How to do a system restore using command prompt?

How to perform a System Restore using Command Prompt? (ransomware or virus is blocking Safe Mode)

The System Restore function restores operating system files to an earlier point in time. System Restore is useful when malicious software infiltrates a computer and damages the system files. Moreover, this function important when dealing with variants of ransomware infections that block computer screens. This tutorial describes the process of performing a System Restore using Command Prompt. In some cases, especially when dealing with ransomware infections, performing a System Restore is a complicated task, since modern fake antivirus programs and ransomware infections are capable of blocking an operating system's Safe Mode and Safe Mode with networking. This leaves one solution: performing a System Restore using Command Prompt.

 
How to remove “Your device has been blocked” ransomware virus from Android tablet or phone?

“Your device has been blocked” - how to remove ransomware infections from an Android devices?

Cyber criminals have been spreading ransomware viruses on Windows-based computers for some time. These types of infections became popular in mid-2006 and continue to infect personal computers and extort money from their victims. Recently, security research began showing a rise in Android-based mobile ransomware infections. Commonly, ransomware viruses exploit the names of authorities including the FBI, USA Cyber Crime Investigations, and The ICE Cyber Crime Center - making fake claims that users must pay an amount of money (for supposed law violations such as watching pornography, using copyrighted files, etc.) in order to unblock their devices.

 
How to remove a Google Chrome extension "Installed by enterprise policy"?

Google Chrome extension "Installed by enterprise policy" - how to remove?

This removal guide shows how to remove a Google Chrome extension that was "Installed by enterprise policy". Note that recently, there is a rise in adware infections, and in many cases, these potentially unwanted programs (PUPs) install on users' Internet browsers disguised as legitimate extensions. Commonly, potentially unwanted applications are bundled with free software downloaded from the Internet, the installation of which, is often a consequence of not paying close attention to the installation steps.

 
Virus is blocking Internet access, how to eliminate it?

Internet access is blocked due to malware infection, how to eliminate it?

This tutorial describes how to re-establish Internet access if blocked by malware. Some malware variants modify Internet browser settings by adding a Proxy Server. In these cases, you will be unable to visit any websites, and thus not able to download the required software to eliminate the security infections. Other types of malware change the computer's DNS settings or add various entries to your operating system's Hosts file. By altering these settings, computer viruses can cause redirect issues or completely block the Internet connection. If you cannot access the Internet, and suspect that this is caused by a virus infection, check the settings below.

 
AMBA Website Ransomware

What is AMBA?

AMBA is ransomware-type virus that targets Russian websites. After infiltrating the server, AMBA encrypts most files on the system and adds the .AMBA or .RROD extension to the name of each encrypted file. A text file ("ПРОЧТИ_МЕНЯ.txt") is then created that contains a message (in Russian) encouraging server owners to contact cyber criminals via the email address provided.

 

Page 35 of 39

<< Start < Prev 31 32 33 34 35 36 37 38 39 Next > End >>